First published: Wed Jun 27 2012(Updated: )
Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=20.0.1132.42 | |
Google Chrome | =20.0.1132.0 | |
Google Chrome | =20.0.1132.1 | |
Google Chrome | =20.0.1132.2 | |
Google Chrome | =20.0.1132.3 | |
Google Chrome | =20.0.1132.4 | |
Google Chrome | =20.0.1132.5 | |
Google Chrome | =20.0.1132.6 | |
Google Chrome | =20.0.1132.7 | |
Google Chrome | =20.0.1132.8 | |
Google Chrome | =20.0.1132.9 | |
Google Chrome | =20.0.1132.10 | |
Google Chrome | =20.0.1132.11 | |
Google Chrome | =20.0.1132.12 | |
Google Chrome | =20.0.1132.13 | |
Google Chrome | =20.0.1132.14 | |
Google Chrome | =20.0.1132.15 | |
Google Chrome | =20.0.1132.16 | |
Google Chrome | =20.0.1132.17 | |
Google Chrome | =20.0.1132.18 | |
Google Chrome | =20.0.1132.19 | |
Google Chrome | =20.0.1132.20 | |
Google Chrome | =20.0.1132.21 | |
Google Chrome | =20.0.1132.22 | |
Google Chrome | =20.0.1132.23 | |
Google Chrome | =20.0.1132.24 | |
Google Chrome | =20.0.1132.25 | |
Google Chrome | =20.0.1132.26 | |
Google Chrome | =20.0.1132.27 | |
Google Chrome | =20.0.1132.28 | |
Google Chrome | =20.0.1132.29 | |
Google Chrome | =20.0.1132.30 | |
Google Chrome | =20.0.1132.31 | |
Google Chrome | =20.0.1132.32 | |
Google Chrome | =20.0.1132.33 | |
Google Chrome | =20.0.1132.34 | |
Google Chrome | =20.0.1132.35 | |
Google Chrome | =20.0.1132.36 | |
Google Chrome | =20.0.1132.37 | |
Google Chrome | =20.0.1132.38 | |
Google Chrome | =20.0.1132.39 | |
Google Chrome | =20.0.1132.40 | |
Google Chrome | =20.0.1132.41 | |
Linux Linux kernel | ||
Apple iPhone OS | <=6.1.4 | |
Apple iPhone OS | =1.0.0 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =2.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1.1 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.2 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.2 | |
Apple iPhone OS | =4.1 | |
Apple iPhone OS | =4.2.1 | |
Apple iPhone OS | =4.2.5 | |
Apple iPhone OS | =4.2.8 | |
Apple iPhone OS | =4.3.0 | |
Apple iPhone OS | =4.3.1 | |
Apple iPhone OS | =4.3.2 | |
Apple iPhone OS | =4.3.3 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.1 | |
Apple iPhone OS | =5.1.1 | |
Apple iPhone OS | =6.0 | |
Apple iPhone OS | =6.0.1 | |
Apple iPhone OS | =6.0.2 | |
Apple iPhone OS | =6.1 | |
Apple iPhone OS | =6.1.2 | |
Apple iPhone OS | =6.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.